How to restore drm licenses. See information about DRM. DRM protection - what is it

The Android operating system at first glance seems simple, but there are so many things in it that when you start to understand the points, your eyes run wide. Some items cause real surprise among users. For example, what does "Reset DRM (remove all DRM licenses)" mean? A question that few people know the answer to.

DRM stands for Digital Rights Management, which can be translated as Digital Rights Management. talking plain language, DRM is an anti-piracy technology used by copyright holders to control access to and copy of works they own. DRM is literally a lock, thanks to which the user will not be able to copy or sell this or that product. Probably some super hackers will be able to crack the DRM code, but for regular user technology will play the role of a kind of protection. By the way, in some cases, DRM technology allows you to delete a file from a user's device remotely! However, this applies in exceptional cases and only certain content or software.

When and where is DRM technology encountered?

  • To play files.
  • To play files in a specific program.

What does DRM license mean?

V operating system Android, you can find an item in the "Restore and Reset" section called "Remove DRM Licenses" or "Reset DRM Licenses". What does it mean?

A DRM license is a digital key that allows you to decrypt content or gives you the right to use it. In the case of Android, we can talk about a license for certain software. For example, the manufacturer embeds some application into the firmware, which, after activation, works for a month during the trial period. After a month, access to the application is blocked and you need to buy a full version. This is the DRM license, or rather, one of many possible ones.

Resetting DRM licenses

So now you know what a DRM license is. It remains to find out whether it is possible to remove licenses from a smartphone or tablet. And here we are waiting for a very interesting fact: the fact is that if you previously purchased some application or other content with a license, after a reset you can simply lose access to this application itself. That is why you need to be extremely careful when resetting DRM licenses, otherwise the consequences may not please you.

Some phone users are faced with incomprehensible menu settings for their devices. One of these is Android DRM License Reset. What this process is and whether it is necessary is described in this article.

What is DRM

Digital Right Management (in the Russian version - "Technical means of copyright protection") is a technology that enables authors to protect their digital products from piracy. In the case of Android, these are applications.

The protection process is carried out through the introduction by the programmer into the software of some technical means that prevent illegal use. As a result, a person uses the software only for personal needs and cannot copy or transfer it to other people.

A DRM license is a key that opens the application's digital lock. Its design uses complex cryptographic algorithms to prevent rapid hacking.

Important! Hacking or bypassing DRM protection is against the law and entails civil and administrative liability in most countries.

How the technology works:

  1. A person purchases a smartphone or tablet, where (in addition to the OS) special software from the developer is installed.
  2. After turning on and activating the device, pre-installed programs work in demo mode for a limited period (week, month). After its expiration, the software ceases to function and offers to purchase the full version and a DRM license for it.

Reset licenses

The main purpose of the reset function is to stop using the purchased software.

Important! hard reset system does not affect purchased licenses, and removing the latter does not affect the performance of the OS, but will prohibit the use of programs protected by DRM technology.

After that, reboot the device if it affected preinstalled apps.

Note! At the moment, DRM is losing its relevance due to the imperfection of protection. In Android 6 and above, there is no reset function.

conclusions

The DRM license is the right to use full version software, which is acquired from its copyright holder. The reset licenses feature allows you to opt out of such software without affecting the performance of Android.

A Digital Rights Management (DRM) license is a tool that allows the copyright holder to control access and prevent illegal copying and distribution of their software. Breaking the digital code for most people will be a task beyond their strength. Therefore, for many users, the question quite logically arises: how can I reset DRM Android licenses So what's this?

DRM is an acronym for Digital Rights Management, which means "Digital Rights Management". It is implemented through the introduction by the developer into the software of various technical means that prevent it from being illegally disposed of. As a result, the person who downloaded the product can use it only for their own purposes, without the possibility of copying and transferring to other users. DRM license is a digital lock, the necessary key to which is with the developer, who is also the copyright holder of this software.

When creating such a digital code, various mathematical algorithms are used, called cryptoalgorithms. We will not go into details and explain what a cryptoalgorithm is, but only note that it is very difficult to crack a DRM license. The most common scheme for implementing this technology on Android is as follows:

  • The user buys a phone or tablet that, in addition to the OS itself, has special software from the developer.
  • After the device is turned on and activated, the pre-installed software starts its work in a demo version (for a period of a week, a month, etc.). At the end of the trial period, the program stops working, offering to buy paid version from the copyright holder.

The purchase of a premium product is the acquisition of a DRM license for the selected application. In addition to the above scheme, there may be other examples of the implementation of copyright protection on Android devices.
You can get acquainted with what a DRM license for Android is by watching the video below.

Reset DRM licenses

Depending on which product is covered by the license, you must use one or another solution to the problem. For example, using various hacking software, you can reset the application inclusion counter. Some utilities allow you to remove the binding of certain files to the site, turn off the need to verify the digital key, and much more.

For your mobile phone running the Android OS, you can reset the DRM license without using hacker programs. To do this, just do the following:

  • Go to the main menu of smartphone settings, through a retractable curtain or from the main screen.
  • Select the "Backup and Reset" tab. In Android 5 and above, it is located under the accounts tab.
  • Click on the line "Reset DRM (DRMreset)".

You should use this feature very carefully, especially if you do not know what will happen when you reset the DRM license. The fact is that after the actions taken, the user may lose access to certain features and functions of applications already installed in the memory. Also, some branded pre-installed programs that are present in phones from Samsung and Sony may simply stop working. But otherwise, the functionality and personalization of the phone will not suffer in any way. A normal factory reset, which can be found in the "Recovery and Reset" tab, will not remove DRM licenses.

How to remove DRM protection

V Lately many Android software developers are constantly faced with user protests regarding the inconvenience of a digital license. However, in many products, including mobile applications, multimedia files, etc., it is still in use today. Consider the main methods that allow you to remove the "digital lock" Digital Rights Management from the most common file types:

  • Usage specialized utilities. For example, free programs"DRM Media Converter" or "DRM Removal" can bypass and deactivate DRM protection from many popular file types. These include documents with extensions: .WMV, .M4B, .M4V, .ASF and many others.
  • Converting files protected by a digital license using converters. These programs include: Digital Music Converter, Sound Taxi, Note Burner, as well as many others that can be found on the Internet. Despite the fact that they are used only for a narrow range of extensions, after conversion you will get an absolutely “clean file”.
  • Use of CD and DWD disks. Files with the WMV and WMA extensions can be easily and easily removed from digital protection if you have a computer and a blank disc at hand. It is enough to burn WMA to CD, and WMV to DVD, and then copy them back to the PC. After that, the DRM license will be removed from them.

DRM removal utility interface

Note that in many cases, you can find a free-to-use alternative to DRM-protected software. Also, by purchasing a paid version of the product from the developers, you guarantee yourself the opportunity to use all the functions and features of the software.

After I read the post on how, I immediately remembered a similar case. Somehow, having opened a regular mp3 file, instead of playback, to my surprise, an unknown web page opened. The most interesting thing is that the page was opened in Internet Explorer"e (despite the fact that another browser was set by default), and after all, on that page, the author of the file could have added some special exploit for IE.

At that moment I did not think about the page with the exploit and instead of carefully analyzing the file and finding out what the problem was, I simply deleted it. The only thing I thought about when I saw the unusual behavior of the system is that someone is promoting their site in a rather original way. Several years have passed, but since then I have not seen such cases. After reading an article about a video virus, I decided that at least this time I should not miss the opportunity to find out how safe one of the most harmless and widespread files in the world is.

Video File

And since, dear, by indicating the link to the file, I did not waste time and quickly downloaded the torrent file. But I was not alone - at the same time with me, the same video file was downloaded by about 15 other people who, I thought, also want to analyze it. But now I realized that most likely most of them had other intentions and they did not know that there would be no kin today.

After the download was completed, knowing that other players cannot play this file, I immediately opened it in Windows media player"e, and the first thing I saw was the message: "Download media usage rights":

After that, a more convincing message appeared, suggesting downloading the License-Installer file which, by the way, has already been checked by an antivirus and turned out to be 100% clean:

After carefully reviewing the message, I clicked on the "Download Now" button and, in anticipation of any reaction from the antivirus, I saw a familiar window offering to download a file from the server license.compress.to:

And then the first question arose, if the server is indicated on the first window free-license.imgpop.com, then why this wonderful file, offers to download a license from the server license.compress.to? To find out what the problem is, I visited both sites, hoping to find something tasty there, but as expected, I did not find anything there.

DRM protection

After that, the first thing that came to mind was "run the sniffer", but refrained (and did the right thing) - deciding to open the file in a Hex editor. I opened a file in a Hex editor, which weighed 150 MB, and to my happiness, everything was very simple, because already on the 20th line I found this piece of text:

It has become much more interesting. Opened the page http://free-license.imgpop.com/venuf.php?id=Movie_0001.wmv which redirected (HTTP/1.1 302) to the page: http://free-license.imgpop.com/venuf/index.htm, and there I saw a familiar picture, only a little larger, and even in the browser:

While everything was going well and wanting to experiment a little, I decided to change the link from the video file to my own. But, seeing that even WMP could not open the file after changing the line, and not knowing what to do, he asked Google if he could tell what the line was, WRMHEADERversion="2.0.0.0", which (among many others) found with the help of a Hex editor?

The answer was short and clear as daylight - I'm dealing with the DRM protection of video files. That is, I discovered how, using legal and fairly convincing methods, attackers can successfully and confidently distribute malicious files, because: firstly, no antivirus will detect that a video file is infected, and secondly, most users trust Microsoft will definitely run such files.

Moreover, WMP is not the only player that can open DRM protected files. Full list I did not find any players, but I can say with confidence that Nero ShowTime supports DRM, only unlike WMP it reacts more carefully ... only if you confirm the download of the license, the web page opens in IE (despite the fact that it is not the default browser ).


And now the most interesting thing: if you change the file extension from .wmv v .asf or in .wma, nothing will change, that is, the players will still play the media file, and what is most dangerous, in most cases, .wma files will be opened in Windows Media player. By the way, I forgot to say, after I opened the video file in a Hex editor, for convenience, I deleted unnecessary bytes and as a result the file size became 5.31KB.

Internet Explorer

Probably, many people think that “There is no danger in this! I will not download any licenses! And anyway, what does Internet Explorer, WMP and video files have to do with it? At first I thought so too, because there is a “Cancel” button there, but as it turned out, there is a danger and not a small one, and “Cancel” will not save anyone if the file is opened in WMP. And Internet Explorer is a browser, software for browsing websites…

I found information that it is possible to crack DRM protection, but did not do this. Firstly, I did not know if it would be possible to change the link, and secondly, I chose more easy way. In file hosts added line:
127.0.0.1 free-license.imgpop.com

To the root local server created a file venuf.php and using WMP opened a video clip - after a few seconds, the following message appeared:

Further, with the help alert(), I decided to try if it supports JavaScript - as a result I got an empty page. I thought that it really didn’t work, but by connecting my intuition, I quickly changed the function alert() on the document.write(). The result brought a smile: this time the page was not empty, so Windows Media Player supports JavaScript.

Now, the idea that a media player can open web pages, and even support JavaScript, haunted me. Wanting to know what this extraordinary player is, I added in the file venuf.php line:
echo $_SERVER["HTTP_USER_AGENT"];
and even though I have MSIE 8.0 installed, I got the following message:

Finally, I decided to check one exploit for MSIE, written in JavaScript, causing a browser denial of service. I added an exploit to the page, opened the video file, and before I could blink, Windows says "Windows Media Player has stopped working":


As you understand, when trying to play a video file, WMP was forcibly disabled, which means that it is vulnerable to an exploit designed for MSIE. I only tested one exploit, but that was enough to change my mind about media file security.

Instead of a postscript

Having written the last lines of this article, one idea suddenly came to me: download, install and test one of the most popular multimedia players - winamp. Which I did ... And when I tried to play the file, the following message appeared:

I was almost sure that everything would be the same as with Nero ShowTime, but curiosity made me click on the "Yes" button ... Instead of launching IE, I saw the following:


I did not immediately understand what the problem was, thinking that anything could happen, but after a few seconds, I remembered that in the file venuf.php there was an exploit code for MSIE. Next, using the variable $HTTP_USER_AGENT I found out that just like WMP, Winamp uses MSIE 7 Internet Explorer for its own purposes:

True, unlike Windows Media Player, Winamp does not warn where the license file will be downloaded from, but allows you to use the right click and see source pages… and also alerts are triggered for it:

Conclusion

At first glance, not everything is as scary as it seems, but I want to draw your attention to the fact that by opening such a file, the user will not be able to stop the exploit from running, and the anti-virus program is not able to help, because if this is a new exploit, then, most likely, it has not yet been added to the antivirus database.

Just keep in mind that not all users have other audio and video players installed. And yet, I don’t believe that a user who has been waiting for 2 hours (at best) to download a long-awaited file, seeing that it is not playing, will simply delete it, and no “do not open files in this player!” will help .

UPD:

Protection

To significantly reduce the risk of possible attacks, I recommend disabling WMP automatic receipt licenses for DRM-protected files. For this, we open Parameters(Options) and in the tab Confidentiality(Privacy) uncheck the box " Obtain licenses automatically for protected content" (Download usage right automatically when I play or sync a file):

WHAT IS THE PROBLEM?

Digital rights management (DRM) is software or firmware that intentionally restricts or hinders various actions with objects of copyright and related rights in electronic form (copying, modifying, viewing, etc.) after they are sold to the end user. DRM was originally conceived to combat online copyright infringement and save regular revenue from the sale of digital copies, but now DRM brings significant inconvenience to legitimate buyers and helps big companies hinder innovation and competition software technologies copyright holders are destroying the doctrine of fair use of works and prosecuting those (including by way of criminal law) who try to circumvent the restrictions on fair use that they impose by means of software.

While DRMs are intended to only prevent the unauthorized copying of works, they generally prevent or restrict any copying, including in the context of fair use of works (including free and former proprietary works whose exclusivity has expired) because impossible technical means automatically distinguish "legitimate" copying from "illegal".

DRM tools allow you to limit the number of copies, and may also impose other restrictions, such as limiting the period during which a protected work can be viewed or played. DRM does not allow you to transfer legally purchased books from one format to another, or play / read them in another country in which the copyright holder does not provide appropriate support and service.

DRM IN US AND INTERNATIONAL LAW

The issue of protection of works from copying for the first time became very relevant for corporate copyright holders with the advent of recording audio and video tape recorders, the appearance of which made media corporations noticeably nervous, because. anyone could create a copy of a music album or film without leaving home. In the US, this led to the so-called Betamax case, in which Universal attempted to stop Sony from making recordable VCRs. The case was resolved in favor of Sony by setting a legal precedent that it is legal to manufacture systems that, in addition to illegal uses (creating illegal copies of movies broadcast on TV), also have significant legal uses (recording TV shows for later viewing in a more user-friendly way). time - given application was also found to be fair use during the trial).

The popularization of computers, the development of the Internet and the general transition to digital methods of storing and transmitting information only increased the concern of copyright holders.

Today, DRM is used by many foreign companies in the field of selling digital content, incl. Amazon, Apple Inc., Microsoft, Electronic Arts, Sony, 1C, Akella, etc.

At the international level, it is the duty of states to provide “legal protection and effective means circumvention of existing DRM is enshrined in Article 11 of the WIPO Copyright Treaty and Article 18 of the WIPO Performances and Phonograms Treaty.

In addition, DRM bypass is also protected by criminal law. The fundamental international normative act in this area, which forms the basis of many national laws of Western countries, is the Computer Crime Convention CETS No. 185, opened for signing in Budapest on 23/11/2001. One of the principles of this Convention is the establishment of criminal liability for the acquisition and use of unlicensed software.

Representatives of the entertainment industry decided to slow down the development of file-sharing technologies for distributing and copying copyrighted content by introducing DRM into the technology. This time, the most popular technology for structuring and presenting content for world wide web in HTML-5 web browsers. This initiative was announced by the World Wide Web Consortium (W3C) under the name "Encrypted Media Extensions" (EME).

DRM (stands for Digital Rights Management) is not a single technology, but rather a class of technologies used by publishers to control digital content. For the end user, it might look something like this: an audiobook purchased digitally from some website plays perfectly on the computer from which the purchase was made. But after copying the book to another computer, it turns into a useless file that cannot be played by any player.

Real-life examples of the use of DRM technologies can be much more complex. DRM was originally designed to prevent copying of digital products, but the next generation of DRM also provided tools to restrict viewing, printing, editing, and so on.

In an attempt to protect the interests of copyright holders, DRM has caused numerous complaints from people who buy digital products. Inability to use purchased music on various personal devices repelled buyers. Eventually, publishers began to realize that it was possible to sell music digitally without DRM protection—and even more successfully.

DRM technologies have received legislative support. For example, in many countries there are laws that prohibit circumvention of copy protection.

But there is one problem with DRM, because these technologies can prevent buyers from exercising their legal rights.

DRM license - what is it in the phone and on the computer?

For example, create backup purchased work.

Without delving into the intricacies of legislation and the practice of applying certain laws in practice, it is possible to propose a strategy that will be completely legal in most countries (among the exceptions, perhaps, Australia can be mentioned). You can create multiple copies of own use or in reserve (but not for sale/distribution). Please note that making more than 10 copies may amount to commercial use, so excessive copying should be avoided. There are no hard and fast rules for making copies, so you could technically lose DRM somewhere along the way and end up with unprotected MP3 copies. However, the use of a program designed to remove copy protection may be unsafe in the context of laws.

Fortunately, DRM can also be removed using general purpose programs such as MP3 Recorder Studio. Just start playing the purchased protected audio file using the appropriate program (iTunes, Windows Media Player or other) and capture the audio with MP3 Recorder Studio, saving the audio directly to MP3. This process uses the built-in feature of sound cards to capture sound within the device itself. Most sound cards provide a recording device called "Stereo Mix" (various names exist), this device allows you to capture everything that the sound card plays. Installation may be required latest driver from the official website of the manufacturer sound card, because the drivers automatically installed by Windows often disable and hide this device.

More information about copying protected music with MP3 Recorder Studio can be found in this article.

A way to protect media content. Is DRM possible on the Web?

Quite a large part of our projects is related to the storage and transmission of video content on the Internet. One of the frequently asked questions by customers is the issue of protecting content from illegal copying and distribution. There is a myth that there are software products and technologies capable of guaranteeing the impossibility of copying and distribution of video content by intruders. In our report, we tried to talk about existing technologies, their vulnerabilities, and about open and free analogues, which provide the same level of protection as closed and very expensive products.

Denis Eldandi: Good day to all! So, I will talk about how bad everything is with DRM technologies, and Alexander (Kistanov) will talk about how to live with it. Let's first - a brief introduction about what is video streaming and DRM. Idea streaming video is to play video or audio that comes from the network without downloading the entire file in advance, with rather small delays and little buffering; it's called streaming. Streaming saves time and nerves of the user, as well as traffic. Actually, in non-streaming, this does not happen at all. We will be talking about streaming in relation to video hosting on the Internet, and as such, streaming technologies such as RSTP, RTMP and HTTP pseudo-streaming.

With the advent of content on the Internet, especially content in high quality, copyright holders are beginning to worry about protecting it from illegal copying. Therefore, they are offered copy protection, which is called DRM. Officially deciphered as Digital Rights Management, Digital Rights Management. Although many prefer deciphering Digital Restriction Management - Digital Restriction Management.

In general, DRM is a way to prohibit and restrict the creation of copies of a work that are distributed digitally. Although, some DRM vendors now say the goal is just to make it harder to make such copies. Most DRM systems use fairly strong encryption. To read encrypted information, you need a secret key. However, there is almost no sense from this, because for legitimate reading and information and for watching movies, you need the same key as for illegitimate copying, for example. Actually, DRM systems try to somehow hide the key from the user, but since the user part of DRM systems is completely in the hands of the user of the system, he is able to get the specified key using the so-called trusted client problem.

Another vulnerability, although less interesting, is that one way or another the film will end up in analog form at some point, albeit not in a cable to the TV, but on the screen itself, for sure, and from there it can always be written to disk, albeit with some loss of quality. The so-called analog hole is very vulnerable. And of course there is very little enough complete systems DRM systems that would not provide media content in an open (digital) form. For example, there is a very common method of "bypassing" DRM - removing the stream from the computer's video buffer (if you were doing a screencast). On the other hand, Windows Media Player, for example, uses various techniques to prevent this from happening. But the developers also do not sleep, and bypass them one way or another. Actually, I didn’t say anything new here, all this is known, there is an organization, a movement that talks about it (on the screen). But DRM vendors still claim to be doing well.

About this thought the developers of RTMP. The RTMP protocol was originally developed by Macromedia for transmitting audio and video over the Internet between a Flash application and a CRM. It uses Port 1235 TCP and works according to the request-response scheme: the client requests a URL, and the server returns the video. The RTMP protocol has different flavors. For example, RTMPT uses HTTP as transport, while RTMPS uses HTTPS/SSL for encryption.

And there is the RTMPE protocol proposed for content protection, and now the manufacturer calls it protected streaming. He should ideally "kill two birds with one stone" - protect (encrypt the stream), and verify the client. The idea was that only the right client could receive the video, which would carry out the check on its side, not show it to “who doesn’t need it”, and it would be impossible to intercept the stream between the server and the client. RTMPE does not use SSL for encryption, the developers decided that it was quite expensive from the server side, i.e. expensive in terms of performance, and decided to make such a home-made “thing” that would use temporary keys and use them to encrypt data. But in fact, since there is no server authentication from the client side, you can easily arrange for this protocol Attack Man in the middle, where the "attacker" gets the content perfectly in open form and saves it on your hard drive.

Also, their so-called client verification is based on a very strange algorithm: the flash application calculates its own hash, takes its own size, and sends it to the server. And the server supposedly knows, and if it arrived incorrectly, it would not give the video. But in fact, it costs nothing to write your own separate client that would download and save data to disk. Of course, saving an RTMPE stream is a little more difficult than clicking right click mouse, and say "save as". But in fact, there are client programs that download anything via RTMPE. And if, of course, the developers set as their goal to complicate illegal copying, then they probably achieved their goal one way or another, but it would be an exaggeration to say that their content is protected. What are the ways out of this situation? Alexander will talk about it.

Alexander Kistanov: As it was said, there really are no exits, practically any existing DRM solution does not provide a 100% guarantee that the content will be protected and safe. So what to do then? In fact, it turns out that there is no need to use any particular DRM solution. The fact is that all existing DRM solutions for web applications have drawbacks. In particular, for example, for some, this is a platform limitation, for others, the ability to use these solutions only on Windows and resource requirements; also, DRM solutions often cost a significant amount of money. Again, they are quite difficult to master.

But as we have shown, there is not much point in using them. And almost the same thing can be achieved using some simpler solutions. For example, we usually do not use RTMP in our systems, serving video files via the HTTP protocol. This allows, for example, from a fairly weak server to give a gigabit of traffic, and even more. But how to make it difficult to copy files with this approach?

In fact, there are opportunities for this. V Adobe Flash, for example, starting from version 10.1, there is such a functionality that allows you to create a video stream played by the player on the fly. This is the append_bytes() method. Using it, one can quite easily write a simple solution that makes saving files difficult. Videos are served simply via HTTP, from the server side it is encoded on the fly with any stream cipher, and on the client side it is encrypted using a hard-coded key. It will not be difficult for a programmer to write such a thing, and it will not be much worse than any existing DRM solution. Thus, copying files will be more difficult.

By the way, why, if it is so easy to copy content, are there so few services that actually duplicate existing ones?

This is because serving the same amount of files as on Youtube would require the creation of the same infrastructure as theirs, which is very expensive and difficult. A potential attacker is tempted to use the content already lying on legal servers, but for his site. It is possible if they buy paid account, access the video in good quality, and after that they create their own website, where they use the video for their own purposes. However, this problem is quite easy to get around even if simple solution using the so-called url verification with token, which is supported in one form or another by almost any HTTP server. The fact is that when we form links to content, we generate a token that contains information about the lifetime of this link and the IP address of the client for which it is valid. This approach virtually eliminates the use of links to content for any illegal purposes.

Thank you very much for your attention!

Questions from the audience:

Does Warner Brothers know that DRM can be hacked? Why do they require DRM?

Denis Eldandi: Warner Brothers is well aware of everything. They demand DRM because they don't listen to the advice of the technical people. Their decisions are more often made by some kind of management that has grown out of the "old school", the old type of information dissemination model. They are accustomed to somehow doing everything the old fashioned way, and "turning a blind eye" to some problems.

- Could you tell us about Flash Access 2.0: how you can “open” it, and what kind of weak spots?

Denis Eldandi: It has a different principle of operation - the license is checked on the server. It turns out that our content is always sold in encrypted form, and the key is the same as in your example.

In fact, "attack" man in the middle could easily have been avoided. It would be enough to check the authenticity of the server, as is done in SSL / HTTPS. But the problem is that the key that is needed to decrypt the content will always be with the client, and he will always be able to use it.

- Unfortunately, I'm not a great specialist in Access. But what I read is a bit of information: it is believed that if the content is not downloaded, but viewed online, then before receiving the stream, we request a license from the content owner's server. And this key also has a limited "lifetime". It seems to be stated that if I do not use a "rag" copy of the video, in principle I will not be able to do it a second time without receiving new license view content?

Denis Eldandi: But what if you make a "client" that will use a good, correct key, but save it all to disk?

Denis Eldandi: You save the byte decoded stream to disk. That is, instead of giving it to the video card, you save it to a file. And the one who writes the program, who automates all this. What is the difficulty?

- Tell me, what is the scheme of work after all? I want to watch a movie, I go to the ticket office and buy a ticket. The ticket is only valid for my IP address for 5 minutes. I send a request to the license server, and I get a license to view content encrypted along the way. Or?

Denis Eldandi: You have decrypted the content. But instead of watching it, you saved it to disk in clear text. And then they watched it 3 times, and distributed the content to everyone.

What is DRM?

- Tell me, will Google Widevine win?

Denis Eldandi: And what does it mean to win, in a business sense or in a technical one? You see, who wins from the business side is more of a marketing question. On the technical side, there is no one to win, because the idea of ​​​​DRM is initially strange.

- Good day! I have been in the content market for a long time, and I want to say that all copyright holders have qualified personnel. They are all aware that it is possible to steal, but they are gradually taking small steps along the path of protecting information so that their solutions somehow work. Everything is clear that an ordinary layman wants to watch a video for free, and the copyright holders want to get money for it. This is a normal struggle, and the only question is where it will lead. It has been rightly said that either the rights holders will impose a method that will more or less work for everyone, or they will abandon DRM, as already happened a few years ago when Warner and Sony and other major majors abandoned DRM in relation to music. And they said: “guys, we are not ready, because we have a high percentage of refusals from people due to the fact that they could not listen to anything at all, or the price is too high.”

It all depends on the situation from the trackers, when all fresh distributions are administratively closed. It seems to me that several departments of operators on trackers that turn off fresh distributions is a much simpler and more effective struggle than implanting a DRM chip in the brain of each user, which then needs to be updated again (laughter in the hall).

Denis Eldandi: Well, how? Administrative methods do not work everywhere. For example, in America they can ban it and send a police detachment. But normal people have already moved to other countries.

- Look: on the site rutracker.ru, for example, there are no fresh distributions. What is shown in the cinema cannot appear on the site, despite the fact that it is possible to agree with the operator to make a digital copy of the film, because there is an administrative server barrier. As a result, it’s very inconvenient that you can’t get fresh content on the tracker, and the copyright holders need at least some time to sell their film until the whole thing goes to the trackers.

I am in no way defending DRM as a user, because it is obvious to me - a problematic system. In addition to the fact that you have to pay money, although I calmly pay for a movie in a cinema, there are many problems with DRM: it is bad, and at the same time it is only under Windows. The question is different: people come to me as a technology supplier and say: “we have an option to distribute Avatar-2 via the Internet 2 days before the cinema, but we can only be allowed to do this for the presence of DRM.” And I say: "sorry guys, there is no DRM." As a result, the contract is lost and money is lost.

Denis Eldandi: Yes, so it's easier to say: Adobe promised that RTMPE is reliable, so we'll do it.

And everyone does it, just those present: don't tell the copyright holders anything that we discussed here, and everything will be fine. (laughter in the hall)

Denis Eldandi: No more questions? Thanks to all!

WMV video format is very widely used in video delivery. However, many WMV videos are blocked with DRM copy protection, such as download or buy videos from Windows Media Player Center, Zune Marketplace, Amazon Video On Demand, BBC iPlayer, Blockbuster, etc. Thanks to the DRM protection license, you can only play videos through specified media players.

Then you can look for ways remove DRM from WMV files, so you can play your purchased movies in any media player without restrictions. Well, what you need is a professional WMV DRM removal software that can help you achieve your task quickly and easily. Here Video Converter Ultimate is recommended remove DRM protection from WMV video files. It integrates full function DRM removal, DVD Ripper, Video Converter, DVD Creator, Media Transfer as well as Video Editor and YouTube Downloader.

DRM in the field of audio and video

With it, you can get rid of WMV DRM protection and convert protected WMV to any popular video formats such as MP4, MOV, MKV, FLV, AVI, etc., and even burn to DVD for playback on DVD players and TV!

Just get DRM removal tool and crack DRM from WMV as easy as ABC!

Remove DRM protection from WMV video files with ease

Download and install this smart DRM converter, install and run it. Then follow below Quick Guide to revoke WMV DRM license protection.

1 Add DRM WMV video

Click the "Add Files" button on the top left corner and select the WMV protected files you want to crack the DRM and convert. You can also drag files to the target panel source. As you can see, the added video can be viewed on the right and you can freely take pictures of your favorite movie scenes.

2 Select output settings

Video Converter Ultimate supports up to 160+ format and media players like AVI, WMV, MPEG, MOV, MKV, FLV, MP4, etc. and 100+ video presets for iPod, iPhone, iPad, Android phone, BlackBerry, etc.

Open the output format drop download list to select the output format you prefer.

To change the video settings, click the "Advanced..." button to adjust the video and audio encoding settings and save them as your own profile.

3 Start removing DRM from WMV

The last step to click the "Convert" button is to start removing DRM copyright protection from WMV and converting WMV to the video format you like. After conversion, you can click the "Find Target" button to access the converted DRM-Free WMV videos directly. Now you can enjoy your movie anytime, anywhere with any player!

Here is a video tutorial on how to remove DRM from WMV.

Liked the article? Share with friends: